Feeds

Cutting the cord: future mobile broadband tech

How internet on the go is going to get much faster

Internet Security Threat Report 2014

Wireless telephony is undergoing a revolution, with technology and implementation philosophy each holding the other back in turn as the industry struggles towards wireless nirvana.

Engineers have spent the last few decades squeezing more data into the same wireless bandwidth, a process that is deep into the realm of diminishing returns. Meanwhile, regulators are loosening rules about what technologies can be deployed by whom, allowing the engineers to exploit new techniques that are defining the standards that will carry the next few decades.

LTE Advance Logo

Mobile telephony was predicated on the ability to make voice calls without wires, but the next generation of wireless standards consider voice calling to be a peripheral function. Instead, data takes central stage. Voice is, after all, just another kind of data. The wireless standards used for telephony today still have a separate channel for voice connections, but LTE (Long-Term Evolution) and WiMax (Worldwide Interoperability for Microwave Access) are both data networks designed to carry broadband data which might incorporate the occasional voice call too - a clear change of focus for the so-called fourth generation (4G) of mobile technologies.

Downloading some history, very slowly

Data was very much an afterthought in the design of the original mobile telephone - the first car phones could be connected to a modem which would squawk down the line at a horribly slow speed. In the UK, tech corporation ICL fitted all its engineers' cars with such modems, and phones to go with them, but it never managed to get a data service working reliably over a network that was ill equipped to handle mission-critical data.

Second-generation technology GSM wasn't a lot better, so wireless data remained something for the desperate specialist despite the launch of Wap (Wireless Application Protocol). Wap promised to deliver the internet on the move, a promise that was made though legendary TV ads that have actually been blamed for killing Wap by setting unrealistic expectations:

There followed a sequence of steps in which the industry repeatedly deluded itself that as soon as data connections could be made slightly faster, users would leap to the wireless internet - and be delighted to pay for it.

Internet Security Threat Report 2014

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Will BlackBerry make a comeback with its SQUARE smartphones?
Plus PC PIMs from company formerly known as RIM
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
Soundbites: News in brief from the Wi-Fi audiophile files
DTS and Sonos sing out but not off the same hymnsheet
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.